참고문헌
- 김병천, 이경호, 박성준, 원동호, '전자 서명 방식의 구현 및 성능분석', 제4회 통신정보 합동학술대회논문집, pp.662-666, 1994
- 박일환, 장청룡, 원동호, '증명이 가능한 전자서명기법', 한국통신정보보호학회논문지, 제4권 제1호, pp.41-50, 1994
- 염홍렬, '전자 서명 방식 고찰', 한국통신정보보호학회 학회지, 제3권 제2호, pp.7-18, 1993
- Debaty, P., Caswell, D., 'Uniform Web presence architecture for people, places, and things,' IEEE Personal Communications, Vol.8, Issue.4, pp.46-51, Aug., 200l https://doi.org/10.1109/98.944003
- W. Diffie and M. E. Hellman, 'New directions in cryptography,' IEEE Trans. on Information Theory IT-22, No.6, pp. 644-654, 1976
- D. L. Dill., 'The Murpi verification system,' In Computer Aided Verification 8th International Conference, pp.390-403, 1996
- A. O. Frier, P. Karlton, and P. C. Kocher, The SSL protocol version 3.0, draft-ietf-tls-ssl-version3-00.txt, November, 1996
- Warwick Ford, Michael S. Baum, Secure Electronic Commerce : Building the Infrastructure for Digital Signatures and Encryption, Prentice Hall, 2000
- Gutzmann, K., 'Access control and session management in the HTTP environment,' IEEE Internet Computing, Vol.5 Issue.l, pp.26-35, Jan.-Feb., 2001 https://doi.org/10.1109/4236.895139
- Niemeyer, R. E., 'Using Web technologies in two MLS environments : a security analysis,' Computer Security Applications Conference, 1997. Proceedings., 13th Annual, pp. 205-214, 1997 https://doi.org/10.1109/CSAC.1997.646191
- K. Nyberg and R. A. Rueppel, 'Message recovery for signature scheme based on the discrete logarithm problem,' Eurocrypt'94 Proceedings, Springer-Verlag, 1995 https://doi.org/10.1007/BFb0053434
- Liu, S., Sullivan, J., Ormaner, J., 'A practical approach to enterprise it security,' IT Professional, Vol.3, Issue.5, pp.3542, Sep.-Oct., 2001 https://doi.org/10.1109/6294.952979
- S. C. Pohlig and M. E. Hellman, 'An improved algorithm for computing logarithm over GF(p) and its cryptographic significance,' IEEE Trans. on Information Theory IT-24, No.5, pp.106-110, 1978
- R. L. Rivest, A. Shamir and L. Adleman, 'A method of obtaining digital signature and public key cryptosystem,' ACM Communication 21, No.2, pp.120-126, 1978 https://doi.org/10.1145/359340.359342
- Rubin, A. D., Geer, D. E., Jr., 'A survey of Web security,' Computer, Vol.31, Issue.9, pp.34-41, Sept., 1998 https://doi.org/10.1109/2.708448
- Lincoln D. Stein, Web Security: A Step-by-Step Reference Guide, Addison-Wesley, 1999
- Wangham, M. S., Lung, L. C., Westphall, C. M., Fraga, J. S., 'Integrating SSL to the JaCoWeb security framework: project and implementation,' Integrated Network Management Proceedings, 2001 IEEE/IFIP International Symposium on, pp.779-792, 2001 https://doi.org/10.1109/INM.2001.918080
- Donna Woouteiler, Web Security; A Matter of Trust, O'Reilly & Associates, 1997
- Younglove, R. W., 'IP security: what makes it work?,' Computing & Control Engineering Journal, Vol.12, Issue.1, pp.44-46, Feb., 2001 https://doi.org/10.1049/cce:20010107